-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On June 11, 2004 08:46, s. keeling wrote: > That still took some Debian servers down (remote kernel > exploit), and Gentoo's servers were compromised (through not too close > checking of the parentage of some packages, I understand). Gnu's > servers took a very hard hit last year too. No backups, either. Oops.
it's probably important to note that while these attacks took advantage of flaws in the Linux kernel, they also required local access which was aquired by compromising other user-space services on the machine. the kernel itself has been pretty safe from non-local attacks against it in recent times... - -- Aaron J. Seigo GPG Fingerprint: 8B8B 2209 0C6F 7C47 B1EA EE75 D6B7 2EB1 A7F1 DB43 while (!horse()); cart(); -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2-rc1-SuSE (GNU/Linux) iD8DBQFAzdJf1rcusafx20MRAuaOAJ92EpUgUk8Gjax76DWKcHNOfJ0KBACgno29 8u1rJdFoUDy9cFi2Bc3MJ9o= =tQEx -----END PGP SIGNATURE----- _______________________________________________ clug-talk mailing list [EMAIL PROTECTED] http://clug.ca/mailman/listinfo/clug-talk_clug.ca

